browser exploit packs â exploitation tactics - SecNiche Security Labs
browser exploit packs â exploitation tactics - SecNiche Security Labs
browser exploit packs â exploitation tactics - SecNiche Security Labs
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
BROWSER EXPLOIT PACKS – EXPLOITATION TACTICS SOOD & ENBODY<br />
[12] ZeroDay Initiative (ZDI). Sun Java Runtime<br />
Environment MixerSequencer Invalid Array Index<br />
Remote Code Execution Vulnerability.<br />
http://www.zerodayinitiative.com/advisories/ZDI-10-<br />
060/.<br />
[13] Malware at Stake. Java OBE + BlackHole – Dead<br />
Man Rising. http://secniche.blogspot.com/2011/02/<br />
java-obe-tookit-<strong>exploit</strong>s-blackhole-dead.html.<br />
[14] Felegyhazi, M.; Kreibich, C. On the Potential of<br />
Proactive Domain Blacklisting. Usenix LEET<br />
Workshop 2010.<br />
[15] MaxMind. http://www.maxmind.com/app/php.<br />
[16] RFC 2616. http://www.w3.org/Protocols/rfc2616/<br />
rfc2616.html.<br />
[17] Park, B.; Hong, S.; Oh, J.; Lee, H. Defending against<br />
Spying with Browser Helper Objects.<br />
http://ccs.korea.ac.kr/papers/tech05_01.pdf.<br />
(Technical Report) 2005.<br />
[18] Polychronakis, M.; Anagnostakis, K.G.; Markatos,<br />
E.P. An Empirical Study of Real-world Polymorphic<br />
Code Injection Attacks. Usenix LEET Workshop<br />
2009.<br />
VIRUS BULLETIN CONFERENCE OCTOBER 2011<br />
9